CVE-2023-25187 – Nokia ASIKA 7.13.52 - Hard-coded private key disclosure
https://notcve.org/view.php?id=CVE-2023-25187
An issue was discovered on NOKIA Airscale ASIKA Single RAN devices before 21B. Nokia Single RAN commissioning procedures do not change (factory-time installed) default SSH public/private key values that are specific to a network operator. As a result, the CSP internal BTS network SSH server (disabled by default) continues to apply the default SSH public/private key values. These keys don't give access to BTS, because service user authentication is username/password-based on top of SSH. Nokia factory installed default SSH keys are meant to be changed from operator-specific values during the BTS deployment commissioning phase. • https://www.exploit-db.com/exploits/51535 http://packetstormsecurity.com/files/173055/Nokia-ASIKA-7.13.52-Private-Key-Disclosure.html https://Nokia.com https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25187 • CWE-798: Use of Hard-coded Credentials •
CVE-2023-25188
https://notcve.org/view.php?id=CVE-2023-25188
An issue was discovered on NOKIA Airscale ASIKA Single RAN devices before 21B. If/when CSP (as a BTS administrator) removes security hardenings from the Nokia Single RAN BTS baseband unit, the BTS baseband unit diagnostic tool AaShell (which is by default disabled) allows unauthenticated access from the mobile network solution internal BTS management network to the BTS embedded Linux operating-system level. • https://Nokia.com https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25188 • CWE-269: Improper Privilege Management •
CVE-2023-26062
https://notcve.org/view.php?id=CVE-2023-26062
A mobile network solution internal fault is found in Nokia Web Element Manager before 22 R1, in which an authenticated, unprivileged user can execute administrative functions. Exploitation is not possible from outside of mobile network solution architecture. This means that exploit is not possible from mobile network user UEs, from roaming networks, or from the Internet. Exploitation is possible only from a CSP (Communication Service Provider) mobile network solution internal BTS management network. • https://nokia.com https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-26062 • CWE-269: Improper Privilege Management •
CVE-2023-26057
https://notcve.org/view.php?id=CVE-2023-26057
An XXE issue was discovered in Nokia NetAct before 22 FP2211 via an XML document to the Configuration Dashboard page. Input validation and a proper XML parser configuration are missing. For an external attacker, it is very difficult to exploit this, because a few dynamically created parameters such as Jsession-id, a CSRF token, and an Nxsrf token would be needed. The attack can realistically only be performed by an internal user. • https://nokia.com https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2022-01 • CWE-611: Improper Restriction of XML External Entity Reference •
CVE-2023-26058
https://notcve.org/view.php?id=CVE-2023-26058
An XXE issue was discovered in Nokia NetAct before 22 FP2211 via an XML document to a Performance Manager page. Input validation and a proper XML parser configuration are missing. For an external attacker, it is very difficult to exploit this, because a few dynamically created parameters such as Jsession-id, a CSRF token, and an Nxsrf token would be needed. The attack can realistically only be performed by an internal user. • https://nokia.com https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2022-02 • CWE-611: Improper Restriction of XML External Entity Reference •